Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Theodoros Ntouskas"'
Autor:
Theodoros Ntouskas
Η διαχείριση ασφάλειας του Πληροφοριακού Συστήματος (ΠΣ) ενός οργανισμού αποτελεί απαραίτητο συστατικό για την εύρυθμη λειτουργία του
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0489a915134c5b6fd90d9128f0232027
https://doi.org/10.12681/eadd/34601
https://doi.org/10.12681/eadd/34601
Autor:
Marianthi Theoharidou, Christos Douligeris, Theodoros Ntouskas, Dimitris Gritzalis, Despoina Polemi, Emmanouil Georgakakis
Publikováno v:
IISA
Port Information and Communication Technology (PICT) systems offer a series of critical services rendering their effective security management an issue of vital importance. Existing regulation, standardization, and risk management methodologies do no
Publikováno v:
Optimization Theory, Decision Making, and Operations Research Applications ISBN: 9781461451334
Existing Risk Management (RM) methodologies are mainly expert driven and require a large number of interviews with the security experts, which makes rather inefficient to take into account the knowledge from all the organization’s participants. In
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e390e2d339e1d82b81516f9bec86f124
https://doi.org/10.1007/978-1-4614-5134-1_21
https://doi.org/10.1007/978-1-4614-5134-1_21
Autor:
Nineta Polemi, Theodoros Ntouskas
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642304354
SEC
SEC
Commercial ports are large scale infrastructures which their Information and Telecommunication (PIT) systems offer critical services and host sensitive data. However the current maritime legislation or standardization efforts do not sufficiently cove
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4ef9492bd3f541814154aaa967cc2298
https://doi.org/10.1007/978-3-642-30436-1_50
https://doi.org/10.1007/978-3-642-30436-1_50
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783642334474
Although small, medium and micro enterprises (SMEs, mEs) play a decisive role in the European digital economy, they have been identified as one of the weakest links in information security. Identifying these security weaknesses and needs we parameter
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::245a87888d897d911a79dd8c740ac488
https://doi.org/10.1007/978-3-642-33448-1_30
https://doi.org/10.1007/978-3-642-33448-1_30
Publikováno v:
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication ISBN: 9783642210396
WISTP
WISTP
Security Management is a necessary process in order to obtain an accurate security policy for Information and Communication Systems (ICS). Organizations spend a lot of money and time to implement their security policy. Existing risk assessment, busin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::295a01b0e8f26128c128e8278a51e0c9
https://doi.org/10.1007/978-3-642-21040-2_23
https://doi.org/10.1007/978-3-642-21040-2_23
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642272592
I3E
I3E
Legal immigration is a complex, multi dimensional issue and the European Commission (E.C.) project ImmigrationPolicy2.0 (IMP2.0) [1] considered it as such by studying its legal, societal and policy implications before proposing and implementing holis
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1df94cec8e4beacd1cc41610d0df857c
https://doi.org/10.1007/978-3-642-27260-8_4
https://doi.org/10.1007/978-3-642-27260-8_4
Autor:
Nineta Polemi, Theodoros Ntouskas
Publikováno v:
2010 Fifth International Conference on Internet and Web Applications and Services.
The large amount of sensitive information and services that Ports’ Information Systems (PIS) manage require effective security management. Existing risk assessment, business continuity and security management methodologies and standards are unable
Autor:
Theodoros Ntouskas, Nineta Polemi
Publikováno v:
International Journal of Multicriteria Decision Making. 2:159
Risk management (RM) is a necessary process in order to identify, categorise and handle security threats, vulnerabilities and risks of information and communication systems (ICS). Existing RM methodologies for the implementation of standards impose v
Publikováno v:
International Journal of Electronic Security and Digital Forensics. 4:124
Although small, medium and micro enterprises (SMEs, mEs) play a decisive role in the European digital economy, they have been identified as one of the weakest links in information security. Identifying these security weaknesses and needs, we paramete